Search Results - (( variable data detection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- data detection »
- variable »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
Get full text
Get full text
Thesis -
3
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The performance of the proposed method is illustrated using simulation study and on glass vessel data with 1920 variables, cardiomyopathy microarray data with 6319 variables, and octane data with 226 dimensions. …”
Get full text
Get full text
Thesis -
4
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
6
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
8
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Results showed that the developed FDD algorithm successfully detect and diagnosed the pre-designed faults. …”
Get full text
Get full text
Monograph -
9
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
11
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…Although the scheme was developed based on data of fatty acid precut fractionation column, the algorithm of fault detection and diagnosis can be extended to other chemical process by changing the x-MR chart and HAZOP for each selected monitoring variables.…”
Get full text
Get full text
Thesis -
12
Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach
Published 2004“…The accuracy of detection was satisfactory that the algorithm was used in deforestation detection of the whole study area in two change periods i.e. …”
Get full text
Get full text
Get full text
Article -
13
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
14
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…Wideband CDMA (WCDMA) which has been accepted as one of the radio access technology for third generation (3G) systems has many advantages such as efficient spectrum utilization and variable user data rates. However, multiple access interference (MAI) is a major constraint limiting the capacity of the system. …”
Get full text
Get full text
Thesis -
15
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
16
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
17
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
Get full text
Get full text
Article -
18
DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS
Published 2018“…Density of the traffic is calculated by the algorithm that have various variables. This project will use Arduino as it microcontroller and the ultrasonic is used to detect the congestion. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…A test on the capability of the model for fault detection revealed that it is possible to detect inlet temperature changes as low as 5 deg. …”
Get full text
Conference or Workshop Item -
20
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…Therefore for that reason we develop another algorithm for clustering space which contributes a higher accuracy compares to K-means cluster with less subclass number, higher stability and bounded time of classification with respect to the variable data size. …”
Get full text
Get full text
Article
